IBM Cloud Pak System 2.3.1.1-2.3.3.7 Account Lockout Bypass
CVE-2023-38273 Published on February 2, 2024

IBM Cloud Pak System information disclosure
IBM Cloud Pak System 2.3.1.1, 2.3.2.0, and 2.3.3.7 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 260733.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2023-38273 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Improper Restriction of Excessive Authentication Attempts

The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.


Products Associated with CVE-2023-38273

Want to know whenever a new CVE is published for IBM Cloud Pak System? stack.watch will email you.

 

Affected Versions

IBM Cloud Pak System: ibm cloud_pak_system:

Exploit Probability

EPSS
0.05%
Percentile
15.20%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.